Movatterモバイル変換


[0]ホーム

URL:


US20150163227A1 - Visually representing and managing access control of resources - Google Patents

Visually representing and managing access control of resources
Download PDF

Info

Publication number
US20150163227A1
US20150163227A1US14/591,317US201514591317AUS2015163227A1US 20150163227 A1US20150163227 A1US 20150163227A1US 201514591317 AUS201514591317 AUS 201514591317AUS 2015163227 A1US2015163227 A1US 2015163227A1
Authority
US
United States
Prior art keywords
visual representation
resource
entity
computer system
boundary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/591,317
Other versions
US9137253B2 (en
Inventor
Gregory J. Boss
Andrew R. Jones
Charles S. Lingafelt
Kevin C. McConnell
John E. Moore, JR.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines CorpfiledCriticalInternational Business Machines Corp
Priority to US14/591,317priorityCriticalpatent/US9137253B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATIONreassignmentINTERNATIONAL BUSINESS MACHINES CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: JONES, ANDREW R., LINGAFELT, CHARLES S., MOORE, JOHN E., JR., Boss, Gregory J., MCCONNELL, KEVIN C.
Publication of US20150163227A1publicationCriticalpatent/US20150163227A1/en
Priority to US14/794,939prioritypatent/US9231958B2/en
Application grantedgrantedCritical
Publication of US9137253B2publicationCriticalpatent/US9137253B2/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

An approach is provided for controlling access to a resource. Visual representations of the resource and an entity are included in a display. In the display, a movement of the entity visual representation to a position proximate to a boundary of the resource visual representation is detected. Based on an attribute assigned to the entity visual representation being determined to satisfy an access control requirement assigned to the resource visual representation, the entity is permitted to access the resource. In the display, based on the entity being permitted to access the resource, a movement of the entity visual representation across the boundary of the resource visual representation and a placement of the entity visual representation within the boundary of the resource visual representation are permitted.

Description

Claims (20)

1. A method of controlling access to an information technology (IT) resource, the method comprising the steps of:
a computer initiating a display including a visual representation of the IT resource and a visual representation of an entity;
the computer detecting in the display a movement of the visual representation of the entity from outside a boundary of the visual representation of the IT resource to a position close to the boundary of the visual representation of the IT resource;
responsive to the step of detecting the movement to the position close to the boundary, the computer determining a first attribute assigned to the visual representation of the entity satisfies an access control requirement assigned to the visual representation of the IT resource;
based on the first attribute assigned to the visual representation of the entity satisfying the access control requirement assigned to the visual representation of the IT resource, the computer determining the entity is permitted to access the IT resource; and
based on the entity being permitted to access the IT resource, the computer permitting in the display a movement of the visual representation of the entity across the boundary of the visual representation of the IT resource and permitting in the display a placement of the visual representation of the entity within the boundary of the visual representation of the IT resource.
2. The method ofclaim 1, further comprising:
the computer initiating the display further including a visual representation of a second entity;
the computer detecting in the display a second movement of the visual representation of the second entity from outside the boundary of the visual representation of the IT resource to a second position close to the boundary of the visual representation of the IT resource;
responsive to the step of detecting the second movement to the second position close to the boundary, the computer determining a second attribute assigned to the visual representation of the second entity does not satisfy the access control requirement assigned to the visual representation of the IT resource;
based on the second attribute assigned to the visual representation of the second entity not satisfying the access control requirement assigned to the visual representation of the IT resource, the computer determining the second entity is not permitted to access the IT resource; and
based on the second entity being not permitted to access the IT resource, the computer presenting in the display a visual cue that indicates the visual representation of the second entity is prevented in the display from (1) moving across the boundary of the visual representation of the IT resource and (2) being placed within the boundary of the visual representation of the IT resource.
5. The method ofclaim 1, further comprising:
the computer initiating the display further including a visual representation of a second entity;
the computer receiving an assignment of an exclusion control requirement to the visual representation of the IT resource;
the computer receiving an assignment of a second attribute to a visual representation of a second entity;
the computer detecting in the display a second movement of the visual representation of the second entity from outside the boundary of the visual representation of the resource to a second position close to the boundary of the visual representation of the resource;
responsive to the step of detecting the second movement to the second position close to the boundary, the computer determining an exclusion control requirement assigned to the visual representation of the IT resource does not indicate exclusion based on a second attribute assigned to the visual representation of the second entity;
the computer determining the second entity is permitted to access the IT resource based on the exclusion control requirement not indicating exclusion; and
based on the second entity being permitted to access the IT resource, the computer permitting in the display a movement of the visual representation of the second entity across the boundary of the visual representation of the IT resource and permitting in the display a placement of the visual representation of the second entity within the boundary of the visual representation of the IT resource.
6. The method ofclaim 1, further comprising:
the computer initiating the display further including a visual representation of a second resource;
the computer receiving an assignment of a second access control requirement to the visual representation of the second resource,
the computer rendering the visual representation of the IT resource as a first geometric shape having a first color;
the computer rendering the visual representation of the second resource as a second geometric shape having a second color,
wherein the first geometric shape and the second geometric shape are of a same type of shape if the IT resource and the second resource are of a same type of resource,
wherein the first geometric shape and the second geometric shape are of different types of shapes if the IT resource and the second resource are of different types of resources,
wherein the first color indicates the access control requirement, and
wherein the second color indicates the second access control requirement.
7. The method ofclaim 1, further comprising:
the computer rendering the visual representation of the IT resource as a first geometric shape having an area within the boundary into which a maximum of N visual representations of N entities fit, wherein N is greater than or equal to 1;
the computer detecting placements of the maximum of the N visual representations of the N entities within the area of the first geometric shape;
the computer detecting a movement in the display of an (N+1)-th visual representation of an (N+1)-th entity to a second position close to the boundary;
based on the placements of the maximum of the N visual representations of the N entities within the area of the first geometric shape, the computer determining the (N+1)-th visual representation of the (N+1)-th entity does not fit into the area that includes the maximum of the N visual representations of the N entities;
the computer determining the (N+1)-th entity is not permitted to access the resource based on the (N+1)-th entity not fitting into the area that includes the maximum of the N visual representations of the N entities; and
based on the (N+1)-th entity being not permitted to access the resource, the computer preventing in the display a placement of the (N+1)-th visual representation of the (N+1)-th entity within the area.
9. A computer program product, comprising:
a computer-readable storage device; and
computer-readable program code stored in the storage device, the computer-readable program code containing instructions that are executed by a central processing unit (CPU) of a computer system to implement a method of controlling access to an information technology (IT) resource, the method comprising the steps of:
the computer system initiating a display including a visual representation of the IT resource and a visual representation of an entity;
the computer system detecting in the display a movement of the visual representation of the entity from outside a boundary of the visual representation of the IT resource to a position close to the boundary of the visual representation of the IT resource;
responsive to the step of detecting the movement to the position close to the boundary, the computer system determining a first attribute assigned to the visual representation of the entity satisfies an access control requirement assigned to the visual representation of the IT resource;
based on the first attribute assigned to the visual representation of the entity satisfying the access control requirement assigned to the visual representation of the IT resource, the computer system determining the entity is permitted to access the IT resource; and
based on the entity being permitted to access the IT resource, the computer system permitting in the display a movement of the visual representation of the entity across the boundary of the visual representation of the IT resource and permitting in the display a placement of the visual representation of the entity within the boundary of the visual representation of the IT resource.
10. The computer program product ofclaim 9, wherein the method further comprises the steps of:
the computer system initiating the display further including a visual representation of a second entity;
the computer system detecting in the display a second movement of the visual representation of the second entity from outside the boundary of the visual representation of the IT resource to a second position close to the boundary of the visual representation of the IT resource;
responsive to the step of detecting the second movement to the second position close to the boundary, the computer system determining a second attribute assigned to the visual representation of the second entity does not satisfy the access control requirement assigned to the visual representation of the IT resource;
based on the second attribute assigned to the visual representation of the second entity not satisfying the access control requirement assigned to the visual representation of the IT resource, the computer system determining the second entity is not permitted to access the IT resource; and
based on the second entity being not permitted to access the IT resource, the computer system presenting in the display a visual cue that indicates the visual representation of the second entity is prevented in the display from (1) moving across the boundary of the visual representation of the IT resource and (2) being placed within the boundary of the visual representation of the IT resource.
12. The computer program product ofclaim 9, wherein the method further comprises the steps of:
the computer system initiating the display further including a visual representation of a second entity;
the computer system receiving an assignment of an exclusion control requirement to the visual representation of the IT resource;
the computer system receiving an assignment of a second attribute to a visual representation of a second entity;
the computer system detecting in the display a second movement of the visual representation of the second entity from outside the boundary of the visual representation of the resource to a second position close to the boundary of the visual representation of the resource;
responsive to the step of detecting the second movement to the second position close to the boundary, the computer system determining an exclusion control requirement assigned to the visual representation of the IT resource does not indicate exclusion based on a second attribute assigned to the visual representation of the second entity;
the computer system determining the second entity is permitted to access the IT resource based on the exclusion control requirement not indicating exclusion; and
based on the second entity being permitted to access the IT resource, the computer system permitting in the display a movement of the visual representation of the second entity across the boundary of the visual representation of the IT resource and permitting in the display a placement of the visual representation of the second entity within the boundary of the visual representation of the IT resource.
13. The computer program product ofclaim 9, wherein the method further comprises the steps of:
the computer system initiating the display further including a visual representation of a second resource;
the computer system receiving an assignment of a second access control requirement to the visual representation of the second resource,
the computer system rendering the visual representation of the IT resource as a first geometric shape having a first color;
the computer system rendering the visual representation of the second resource as a second geometric shape having a second color,
wherein the first geometric shape and the second geometric shape are of a same type of shape if the IT resource and the second resource are of a same type of resource,
wherein the first geometric shape and the second geometric shape are of different types of shapes if the IT resource and the second resource are of different types of resources,
wherein the first color indicates the access control requirement, and
wherein the second color indicates the second access control requirement.
14. The computer program product ofclaim 9, wherein the method further comprises the steps of:
the computer system rendering the visual representation of the IT resource as a first geometric shape having an area within the boundary into which a maximum of N visual representations of N entities fit, wherein N is greater than or equal to 1;
the computer system detecting placements of the maximum of the N visual representations of the N entities within the area of the first geometric shape;
the computer system detecting a movement in the display of an (N+1)-th visual representation of an (N+1)-th entity to a second position close to the boundary;
based on the placements of the maximum of the N visual representations of the N entities within the area of the first geometric shape, the computer system determining the (N+1)-th visual representation of the (N+1)-th entity does not fit into the area that includes the maximum of the N visual representations of the N entities;
the computer system determining the (N+1)-th entity is not permitted to access the resource based on the (N+1)-th entity not fitting into the area that includes the maximum of the N visual representations of the N entities; and
based on the (N+1)-th entity being not permitted to access the resource, the computer system preventing in the display a placement of the (N+1)-th visual representation of the (N+1)-th entity within the area.
15. A computer system comprising:
a central processing unit (CPU);
a memory coupled to the CPU of the computer system; and
a computer-readable storage device coupled to the CPU of the computer system, the storage device containing instructions that, when executed by the CPU of the computer system via the memory, implement a method of controlling access to an information technology (IT) resource, the method comprising the steps of:
the computer system initiating a display including a visual representation of the IT resource and a visual representation of an entity;
the computer system detecting in the display a movement of the visual representation of the entity from outside a boundary of the visual representation of the IT resource to a position close to the boundary of the visual representation of the IT resource;
responsive to the step of detecting the movement to the position close to the boundary, the computer system determining a first attribute assigned to the visual representation of the entity satisfies an access control requirement assigned to the visual representation of the IT resource;
based on the first attribute assigned to the visual representation of the entity satisfying the access control requirement assigned to the visual representation of the IT resource, the computer system determining the entity is permitted to access the IT resource; and
based on the entity being permitted to access the IT resource, the computer system permitting in the display a movement of the visual representation of the entity across the boundary of the visual representation of the IT resource and permitting in the display a placement of the visual representation of the entity within the boundary of the visual representation of the IT resource.
16. The computer system ofclaim 15, wherein the method further comprises the steps of:
the computer system initiating the display further including a visual representation of a second entity;
the computer system detecting in the display a second movement of the visual representation of the second entity from outside the boundary of the visual representation of the IT resource to a second position close to the boundary of the visual representation of the IT resource;
responsive to the step of detecting the second movement to the second position close to the boundary, the computer system determining a second attribute assigned to the visual representation of the second entity does not satisfy the access control requirement assigned to the visual representation of the IT resource;
based on the second attribute assigned to the visual representation of the second entity not satisfying the access control requirement assigned to the visual representation of the IT resource, the computer system determining the second entity is not permitted to access the IT resource; and
based on the second entity being not permitted to access the IT resource, the computer system presenting in the display a visual cue that indicates the visual representation of the second entity is prevented in the display from (1) moving across the boundary of the visual representation of the IT resource and (2) being placed within the boundary of the visual representation of the IT resource.
18. The computer system ofclaim 15, wherein the method further comprises the steps of:
the computer system initiating the display further including a visual representation of a second entity;
the computer system receiving an assignment of an exclusion control requirement to the visual representation of the IT resource;
the computer system receiving an assignment of a second attribute to a visual representation of a second entity;
the computer system detecting in the display a second movement of the visual representation of the second entity from outside the boundary of the visual representation of the resource to a second position close to the boundary of the visual representation of the resource;
responsive to the step of detecting the second movement to the second position close to the boundary, the computer system determining an exclusion control requirement assigned to the visual representation of the IT resource does not indicate exclusion based on a second attribute assigned to the visual representation of the second entity;
the computer system determining the second entity is permitted to access the IT resource based on the exclusion control requirement not indicating exclusion; and
based on the second entity being permitted to access the IT resource, the computer system permitting in the display a movement of the visual representation of the second entity across the boundary of the visual representation of the IT resource and permitting in the display a placement of the visual representation of the second entity within the boundary of the visual representation of the IT resource.
19. The computer system ofclaim 15, wherein the method further comprises the steps of:
the computer system initiating the display further including a visual representation of a second resource;
the computer system receiving an assignment of a second access control requirement to the visual representation of the second resource,
the computer system rendering the visual representation of the IT resource as a first geometric shape having a first color;
the computer system rendering the visual representation of the second resource as a second geometric shape having a second color,
wherein the first geometric shape and the second geometric shape are of a same type of shape if the IT resource and the second resource are of a same type of resource,
wherein the first geometric shape and the second geometric shape are of different types of shapes if the IT resource and the second resource are of different types of resources,
wherein the first color indicates the access control requirement, and
wherein the second color indicates the second access control requirement.
20. The computer system ofclaim 15, wherein the method further comprises the steps of:
the computer system rendering the visual representation of the IT resource as a first geometric shape having an area within the boundary into which a maximum of N visual representations of N entities fit, wherein N is greater than or equal to 1;
the computer system detecting placements of the maximum of the N visual representations of the N entities within the area of the first geometric shape;
the computer system detecting a movement in the display of an (N+1)-th visual representation of an (N+1)-th entity to a second position close to the boundary;
based on the placements of the maximum of the N visual representations of the N entities within the area of the first geometric shape, the computer system determining the (N+1)-th visual representation of the (N+1)-th entity does not fit into the area that includes the maximum of the N visual representations of the N entities;
the computer system determining the (N+1)-th entity is not permitted to access the resource based on the (N+1)-th entity not fitting into the area that includes the maximum of the N visual representations of the N entities; and
based on the (N+1)-th entity being not permitted to access the resource, the computer system preventing in the display a placement of the (N+1)-th visual representation of the (N+1)-th entity within the area.
US14/591,3172011-07-272015-01-07Visually representing and managing access control of resourcesExpired - Fee RelatedUS9137253B2 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US14/591,317US9137253B2 (en)2011-07-272015-01-07Visually representing and managing access control of resources
US14/794,939US9231958B2 (en)2011-07-272015-07-09Visually representing and managing access control of resources

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US13/191,564US8756509B2 (en)2011-07-272011-07-27Visually representing and managing access control of resources
US14/269,565US8943413B2 (en)2011-07-272014-05-05Visually representing and managing access control of resources
US14/591,317US9137253B2 (en)2011-07-272015-01-07Visually representing and managing access control of resources

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/269,565ContinuationUS8943413B2 (en)2011-07-272014-05-05Visually representing and managing access control of resources

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US14/794,939ContinuationUS9231958B2 (en)2011-07-272015-07-09Visually representing and managing access control of resources

Publications (2)

Publication NumberPublication Date
US20150163227A1true US20150163227A1 (en)2015-06-11
US9137253B2 US9137253B2 (en)2015-09-15

Family

ID=47598316

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US13/191,564Expired - Fee RelatedUS8756509B2 (en)2011-07-272011-07-27Visually representing and managing access control of resources
US14/269,565Expired - Fee RelatedUS8943413B2 (en)2011-07-272014-05-05Visually representing and managing access control of resources
US14/591,317Expired - Fee RelatedUS9137253B2 (en)2011-07-272015-01-07Visually representing and managing access control of resources
US14/794,939Expired - Fee RelatedUS9231958B2 (en)2011-07-272015-07-09Visually representing and managing access control of resources

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US13/191,564Expired - Fee RelatedUS8756509B2 (en)2011-07-272011-07-27Visually representing and managing access control of resources
US14/269,565Expired - Fee RelatedUS8943413B2 (en)2011-07-272014-05-05Visually representing and managing access control of resources

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US14/794,939Expired - Fee RelatedUS9231958B2 (en)2011-07-272015-07-09Visually representing and managing access control of resources

Country Status (1)

CountryLink
US (4)US8756509B2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9231958B2 (en)2011-07-272016-01-05International Business Machines CorporationVisually representing and managing access control of resources
US9591489B2 (en)2015-07-092017-03-07International Business Machines CorporationControlling application access to applications and resources via graphical representation and manipulation

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP5936238B2 (en)*2014-04-112016-06-22インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Method for generating or changing password, electronic device and program for electronic device
KR102468268B1 (en)*2015-05-082022-11-18삼성전자주식회사Terminal device and method for protecting information thereof
WO2016182272A1 (en)2015-05-082016-11-17Samsung Electronics Co., Ltd.Terminal device and method for protecting information thereof
US10885014B2 (en)*2017-02-282021-01-05Citrix Systems, Inc.Assigning monitoring responsibilities in distributed systems using optimistic concurrency
CN107292580A (en)*2017-05-272017-10-24成都牵牛草信息技术有限公司The commission of examination and approval workflow and its recommit method

Citations (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5911143A (en)*1994-08-151999-06-08International Business Machines CorporationMethod and system for advanced role-based access control in distributed and centralized computer systems
US5926834A (en)*1997-05-291999-07-20International Business Machines CorporationVirtual data storage system with an overrun-resistant cache using an adaptive throttle based upon the amount of cache free space
US5987506A (en)*1996-11-221999-11-16Mangosoft CorporationRemote access and geographically distributed computers in a globally addressable storage environment
US6119151A (en)*1994-03-072000-09-12International Business Machines Corp.System and method for efficient cache management in a distributed file system
US6195650B1 (en)*2000-02-022001-02-27Hewlett-Packard CompanyMethod and apparatus for virtualizing file access operations and other I/O operations
US6356863B1 (en)*1998-09-082002-03-12Metaphorics LlcVirtual network file server
US6574618B2 (en)*1998-07-222003-06-03Appstream, Inc.Method and system for executing network streamed application
US6748502B2 (en)*2001-01-122004-06-08Hitachi, Ltd.Virtual volume storage
US20040210604A1 (en)*1999-12-012004-10-21Jin LiMethods and systems for providing random access to structured media content
US7139811B2 (en)*2001-08-012006-11-21Actona Technologies Ltd.Double-proxy remote data access system
US7185192B1 (en)*2000-07-072007-02-27Emc CorporationMethods and apparatus for controlling access to a resource
US7774827B2 (en)*2005-06-062010-08-10Novell, Inc.Techniques for providing role-based security with instance-level granularity
US8336078B2 (en)*2006-07-112012-12-18Fmr Corp.Role-based access in a multi-customer computing environment

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP2001157658A (en)1999-12-022001-06-12Fuji Photo Film Co LtdFluorescent image display device
US7350204B2 (en)2000-07-242008-03-25Microsoft CorporationPolicies for secure software execution
EP1217541A1 (en)*2000-11-292002-06-26Lafayette Software Inc.Method of processing queries in a database system, and database system and software product for implementing such method
US7308580B2 (en)*2002-04-232007-12-11International Business Machines CorporationSystem and method for ensuring security with multiple authentication schemes
US7127467B2 (en)*2002-05-102006-10-24Oracle International CorporationManaging expressions in a database system
US9003295B2 (en)2003-03-172015-04-07Leo Martin BaschyUser interface driven access control system and method
US7694328B2 (en)*2003-10-212010-04-06Google Inc.Systems and methods for secure client applications
US7681131B1 (en)*2004-11-102010-03-16InternetPerils, Inc.Method and apparatus for aggregating, condensing, supersetting, and displaying network topology and performance data
US9176934B2 (en)2005-05-062015-11-03Leo BaschyUser interface for nonuniform access control system and methods
DE102005021854B4 (en)*2005-05-112007-02-15Siemens Ag Property-based resource allocation to security domains
US20070073699A1 (en)*2005-09-262007-03-29Aegis Business Group, Inc.Identity management system for managing access to resources
US8196178B2 (en)*2005-10-052012-06-05Microsoft CorporationExpert system analysis and graphical display of privilege elevation pathways in a computing environment
US20070150934A1 (en)*2005-12-222007-06-28Nortel Networks Ltd.Dynamic Network Identity and Policy management
US7536396B2 (en)*2006-03-212009-05-19At&T Intellectual Property Ii, L.P.Query-aware sampling of data streams
US7613726B1 (en)2006-03-272009-11-03Emc CorporationFramework for defining and implementing behaviors across and within content object types
US7937669B2 (en)2007-06-122011-05-03Honeywell International Inc.Access control system with rules engine architecture
US8132231B2 (en)*2007-12-062012-03-06International Business Machines CorporationManaging user access entitlements to information technology resources
US20090327900A1 (en)2008-06-262009-12-31Microsoft CorporationIndicating resources to which there are access rights
US20110040793A1 (en)2009-08-122011-02-17Mark DavidsonAdministration Groups
US8763080B2 (en)2011-06-072014-06-24Blackberry LimitedMethod and devices for managing permission requests to allow access to a computing resource
US8756509B2 (en)2011-07-272014-06-17International Business Machines CorporationVisually representing and managing access control of resources
US20130067413A1 (en)2011-09-092013-03-14International Business Machines CorporationControl of Information Technology Resource Behavior Using Visual Positioning
US9106650B2 (en)2011-11-092015-08-11Microsoft Technology Licensing, LlcUser-driven access control
US8832847B2 (en)2012-07-102014-09-09International Business Machines CorporationCoordinating data sharing among applications in mobile devices
US9075955B2 (en)2012-10-242015-07-07Blackberry LimitedManaging permission settings applied to applications

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6119151A (en)*1994-03-072000-09-12International Business Machines Corp.System and method for efficient cache management in a distributed file system
US5911143A (en)*1994-08-151999-06-08International Business Machines CorporationMethod and system for advanced role-based access control in distributed and centralized computer systems
US5987506A (en)*1996-11-221999-11-16Mangosoft CorporationRemote access and geographically distributed computers in a globally addressable storage environment
US5926834A (en)*1997-05-291999-07-20International Business Machines CorporationVirtual data storage system with an overrun-resistant cache using an adaptive throttle based upon the amount of cache free space
US6574618B2 (en)*1998-07-222003-06-03Appstream, Inc.Method and system for executing network streamed application
US6356863B1 (en)*1998-09-082002-03-12Metaphorics LlcVirtual network file server
US20040210604A1 (en)*1999-12-012004-10-21Jin LiMethods and systems for providing random access to structured media content
US6195650B1 (en)*2000-02-022001-02-27Hewlett-Packard CompanyMethod and apparatus for virtualizing file access operations and other I/O operations
US7185192B1 (en)*2000-07-072007-02-27Emc CorporationMethods and apparatus for controlling access to a resource
US6748502B2 (en)*2001-01-122004-06-08Hitachi, Ltd.Virtual volume storage
US7139811B2 (en)*2001-08-012006-11-21Actona Technologies Ltd.Double-proxy remote data access system
US7774827B2 (en)*2005-06-062010-08-10Novell, Inc.Techniques for providing role-based security with instance-level granularity
US8336078B2 (en)*2006-07-112012-12-18Fmr Corp.Role-based access in a multi-customer computing environment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9231958B2 (en)2011-07-272016-01-05International Business Machines CorporationVisually representing and managing access control of resources
US9591489B2 (en)2015-07-092017-03-07International Business Machines CorporationControlling application access to applications and resources via graphical representation and manipulation
US10481756B2 (en)2015-07-092019-11-19International Business Machines CorporationControlling application access to applications and resources via graphical representation and manipulation

Also Published As

Publication numberPublication date
US8943413B2 (en)2015-01-27
US20130031480A1 (en)2013-01-31
US8756509B2 (en)2014-06-17
US9137253B2 (en)2015-09-15
US20140245429A1 (en)2014-08-28
US9231958B2 (en)2016-01-05
US20150312261A1 (en)2015-10-29

Similar Documents

PublicationPublication DateTitle
US9231958B2 (en)Visually representing and managing access control of resources
US10437549B2 (en)Selective screen sharing
US10044501B1 (en)Selective content security using visual hashing
US20190034648A1 (en)Managing access to documents with a file monitor
US11245735B1 (en)Screen-sharing content reconfiguration
US11093630B2 (en)Determining viewable screen content
US9411963B2 (en)Visual display of risk-identifying metadata for identity management access requests
US9984087B2 (en)Performing actions on objects as a result of applying tags to the objects
US11061982B2 (en)Social media tag suggestion based on product recognition
US9571500B1 (en)Context sensitive security help
US9887888B2 (en)Managing change in an information technology environment
US20160092887A1 (en)Application license distribution and management
US20210064775A1 (en)Nlp workspace collaborations
WO2017143996A1 (en)Data presentation method and device
CN113065106A (en)Account management method and device
US10084663B2 (en)Enabling a tag to show status
US11669600B2 (en)Controlling a use of shared demo assets using a digital watermark
US20120159611A1 (en)Central Administration and Abstraction of Licensed Software Features
US11695753B2 (en)Accessing and organizing data sets directly from a data warehouse
US9075501B1 (en)Visual planner for strategic planning
US11689533B2 (en)Managing worksheet access
US9378225B2 (en)Core service build / deployment for hierarchical database
US11580079B2 (en)Providing access to usage reports on a cloud-based data warehouse
CN108280359A (en)A kind of management method and server of security document
US20190005033A1 (en)Linked record declaration of related content items

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BOSS, GREGORY J.;JONES, ANDREW R.;LINGAFELT, CHARLES S.;AND OTHERS;SIGNING DATES FROM 20140430 TO 20140501;REEL/FRAME:034654/0130

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FEPPFee payment procedure

Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPSLapse for failure to pay maintenance fees

Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20190915


[8]ページ先頭

©2009-2025 Movatter.jp